{ "schema_version": "1.4.0", "id": "GHSA-r8jw-f89q-p7g6", "modified": "2023-02-13T15:30:26Z", "published": "2023-02-03T06:30:24Z", "aliases": [ "CVE-2023-25135" ], "details": "vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25135" }, { "type": "WEB", "url": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4473890-vbulletin-5-6-9-security-patch" }, { "type": "WEB", "url": "https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable" } ], "database_specific": { "cwe_ids": [ "CWE-502" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-02-03T05:15:00Z" } }